I’d like to give you an inside look at our Allen Data Center and go over how Cisco IT is adopting new technologies and capabilities while at the same time running the business. I’ll answer your top of mind questions and cover topics such as: Read More »
Cisco is announcing another important strategic partner to its list of ACI-compliant vendors with the addition of the Check Point Next Generation Security Gateway to the ecosystem. A couple months ago I wrote about the inherent security architecture in ACI (Security for an Application Centric World), and now the Check Point solutions fit right into that framework as an alternative to Cisco security solutions. Essentially, this means that the ACI controller, APIC, can now configure the application network to include the insertion and provisioning of Check Point virtual and physical security gateways as it does other Layer 4-7 application services and security appliances. The availability of the Check Point solutions will offer customers greater choice and flexibility while underscoring the open, multi-vendor approach of ACI.
[Note: Check Point will be participating in our upcoming ACI Webcast event: “Is Your Data Center Ready for the Application Economy”, January 13, 2015, 9 AM PT, Noon ET, featuring ACI customers and several other key ACI technology partners. Register here.]
In scalable, multitenant cloud environments with flexible resource placement, almost every workload must be secured from every other workload, with detailed security policies enabled between workloads in an application network: a concept called micro-segmentation. This level of security policy detail can become tedious to manage on an application-by-application basis. It also can potentially restrict workload mobility and the ways that applications can be deployed in the cloud.
Cisco ACI policies abstract the network, devices, and services into a hierarchical, logical object model. In this model, administrators specify the Layer 4 through Layer 7 services (firewalls, load balancers, etc.) that are applied, the kind of traffic to which they are applied, and the traffic that is permitted. These services can be chained together and are presented to application developers as a single object with simple input and output. Connection of application-tier objects and server objects creates an application network profile (ANP). When this ANP is applied to the network, the devices are told to configure themselves to support it. Tier objects can be groups of hundreds of servers, or just one device; the same policies are applied to all the objects in a single configuration step (see below).
The integration with Check Point Next Generation Security Gateway provides automated security provisioning and a full range of security protections and threat-prevention capabilities in a highly dynamic and agile Cisco ACI environment. Check Point Security Gateways can be deployed as physical or virtual solutions and address today’s ever-changing threat landscape with a modular and dynamic security architecture.
#CiscoChampion Radio is a series by Cisco Champions as technologists. We’re kicking off Season 2 with Cisco Senior Architect Azeem Suleman, who is talking about Cisco ACI. Lauren Friedman (@lauren) moderates and Scott Morris and Jason Benedicic are this week’s Cisco Champion guest hosts.
Listen to the Podcast.
Azeem Suleman, Cisco Senior Architect
Benefits of ACI
Use case examples
Why ACI is different (from an SDN perspective)
Best practices for implementing ACI
ACI “WOW” factors Read More »
[Note: For more perspective on the growing momentum for Cisco ACI and Nexus 9000, register today for our upcoming live ACI webcast: “Is Your Data Center Ready for the Application Economy”, January 13, 2015, 9 AM PT, Noon ET, featuring more ACI customers and several key ACI technology partners.]
Momentum continues to build for Cisco Application Centric Infrastructure (ACI) and Nexus 9000 Series Switches as we close out 2014 and head into the New Year. Cisco and TMC have announced that Cisco has been awarded to InfoTech Spotlight Data Center Excellence Awards for Cisco ACI and the Nexus 9000 series switch.
TMC, a global, integrated media company helping clients build communities in print, in person and online, announced the winners of the 2014 Data Center Excellence Awards last month, as presented by infoTECH Spotlight. For more than 20 years, TMC has been honoring technology companies with awards in various categories. These awards are regarded as some of the most prestigious and respected honors in the communications and technology sector worldwide. Winners represent prominent players in the market who consistently demonstrate the advancement of technologies. Each recipient is a verifiable leader in the marketplace.
[Note: If you like hearing these customer perspectives, register today for our upcoming live ACI webcast: “Is Your Data Center Ready for the Application Economy”, January 13, 2015, 9 AM PT, Noon ET, featuring more ACI customers and several key ACI technology partners.]
Happy New Year to everyone! I thought this would be a great opportunity now that everyone is back into the swing of work to highlight a couple of customer presentations from last month at the Gartner Data Center Conference in Las Vegas. Cisco hosted a 30 minute session on our Application Centric Infrastructure (ACI) and we invited two customers, Acxiom and Symantec, to present their use cases and experience in deploying ACI so far.
These Gartner conferences attract primarily CIO and high-level IT executives, and it’s no secret that they prefer hearing from industry peers rather than vendor product pitches. Kamal Kharrat from Acxiom and Vince Spina from Symantec both do a great job talking about real benefits from their deployment and the reasons they chose ACI as a primary platform for their SDN strategy.